CN113726742A - Test authentication method, device, electronic equipment and medium - Google Patents
Test authentication method, device, electronic equipment and medium Download PDFInfo
- Publication number
- CN113726742A CN113726742A CN202110870213.XA CN202110870213A CN113726742A CN 113726742 A CN113726742 A CN 113726742A CN 202110870213 A CN202110870213 A CN 202110870213A CN 113726742 A CN113726742 A CN 113726742A
- Authority
- CN
- China
- Prior art keywords
- authentication
- information
- test
- verification information
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N17/00—Diagnosis, testing or measuring for television systems or their details
- H04N17/002—Diagnosis, testing or measuring for television systems or their details for television cameras
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a test authentication method, a test authentication device, electronic equipment and a medium, wherein the method comprises the following steps: responding to an authentication instruction sent by the terminal equipment, sending randomly generated authentication information to the terminal equipment, and carrying out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information; receiving second verification information fed back by the terminal equipment, wherein the second verification information is obtained by the terminal equipment through carrying out preset conversion processing on the received authentication information, and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule; and determining whether the authentication passes by comparing the first verification information with the second verification information, and starting the test if the authentication passes. Therefore, the communication safety of the terminal equipment and the test equipment is ensured, and the risk that the core algorithm is reversely analyzed and stolen is reduced.
Description
Technical Field
The present invention relates to the field of test technologies, and in particular, to a test authentication method and apparatus, an electronic device, and a medium.
Background
The test system of the camera consists of two parts, one part is test software which comprises various imaging quality detection algorithms and electrical index tests, and the other part is a test box (namely a test tool) which provides image acquisition and electrical measurement support. A set of communication protocols are arranged between the test software and the test box, such as an image acquisition instruction, a power supply instruction, an IIC control instruction and the like, and firmware in the test box can solidify a part of image processing algorithms to accelerate detection efficiency. However, in practical application, the communication protocol has a risk of being analyzed by a packet capturing, and it is particularly important to ensure the communication security of the test box in order to protect the core algorithm from reverse analysis and embezzlement.
Disclosure of Invention
The invention provides a test authentication method, a test authentication device, electronic equipment and a test authentication medium, which can perform safety authentication before a test box is started to normally work and are beneficial to ensuring the communication safety of the test equipment.
In a first aspect, an embodiment of the present specification provides a test authentication method, which is applied to a test device, and the method includes: responding to an authentication instruction sent by terminal equipment, sending randomly generated authentication information to the terminal equipment, and carrying out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information; receiving second verification information fed back by the terminal equipment, wherein the second verification information is obtained by the terminal equipment through carrying out preset conversion processing on the received authentication information, and a conversion rule adopted by the terminal equipment is the same as the preset conversion rule; and determining whether the authentication passes through by comparing the first verification information with the second verification information, and starting a test if the authentication passes.
Further, the authentication information is a random number or a pseudo-random number. The converting the generated authentication information based on the preset conversion rule to obtain first verification information includes: processing the authentication information according to a preset logic operation rule to obtain a processing result; and obtaining the first verification information based on the processing result.
Further, the obtaining the first verification information based on the processing result includes: and encrypting the processing result based on a preset key to obtain the first verification information.
Further, the processing the authentication information according to a preset logic operation rule to obtain a processing result includes: dividing the authentication information into four pieces of sub information; performing exclusive-or operation on two pieces of sub information to obtain first intermediate data, and performing exclusive-or operation on the other two pieces of sub information to obtain second intermediate data; and splicing the first intermediate data and the second intermediate data to obtain the processing result.
Further, the determining whether the authentication is passed by comparing the first verification information and the second verification information includes: if the first verification information is consistent with the second verification information, judging that the authentication is passed; and if the first verification information is inconsistent with the second verification information, judging that the authentication is not passed.
In a second aspect, an embodiment of the present specification provides a test authentication method, which is applied to a terminal device, and the method includes: sending an authentication instruction to test equipment so that the test equipment randomly generates authentication information based on the authentication instruction, and converting the generated authentication information based on a preset conversion rule to obtain first verification information; receiving authentication information sent by the test equipment, performing preset conversion processing on the received authentication information to obtain second verification information, and sending the second verification information to the test equipment, so that the test equipment determines whether the authentication passes through the comparison between the first verification information and the second verification information, and if the authentication passes, starting the test; and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
In a third aspect, an embodiment of the present specification provides a test authentication apparatus, which is applied to a test device, and includes: the generation and processing module is used for responding to an authentication instruction sent by the terminal equipment, sending randomly generated authentication information to the terminal equipment, and converting the generated authentication information based on a preset conversion rule to obtain first verification information; the information receiving module is used for receiving second verification information fed back by the terminal equipment, wherein the second verification information is obtained by carrying out preset conversion processing on the received authentication information by the terminal equipment, and a conversion rule adopted by the terminal equipment is the same as the preset conversion rule; and the verification module is used for determining whether the authentication passes through by comparing the first verification information with the second verification information, and starting a test if the authentication passes through.
In a fourth aspect, an embodiment of the present specification provides a test authentication apparatus, which is applied to a terminal device, and the apparatus includes: the instruction sending module is used for sending an authentication instruction to the test equipment so that the test equipment randomly generates authentication information based on the authentication instruction, and carries out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information; the information conversion module is used for receiving the authentication information sent by the test equipment, carrying out preset conversion processing on the received authentication information to obtain second verification information, and sending the second verification information to the test equipment, so that the test equipment determines whether the authentication passes through by comparing the first verification information with the second verification information, and if the authentication passes, starting the test; and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
In a fifth aspect, an embodiment of the present specification provides an electronic device, including: a processor, a memory and a computer program stored on the memory, wherein the steps of the test authentication method provided by the first aspect or the second aspect are implemented when the computer program is executed by the processor.
In a sixth aspect, the present specification provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the test authentication method provided in the first or second aspect.
In the test authentication method provided in one embodiment of the present specification, an authentication instruction sent by a terminal device is sent to a test device; then, the test equipment randomly generates authentication information, feeds the authentication information back to the terminal equipment, and carries out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information; the terminal equipment performs the same preset conversion processing on the received authentication information to obtain second verification information, sends the second verification information to the test equipment, and the test equipment determines whether the authentication passes through by comparing the first verification information with the second verification information, and starts the test if the authentication passes through. Before the test equipment (namely the test box or the test tool) is started to normally work, the test authentication process is firstly carried out for safety authentication, and when the test equipment passes the authentication, the test is started, so that the communication safety of the terminal equipment and the test equipment is ensured, and the risk that a core algorithm is reversely analyzed and stolen is reduced.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the specification. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic diagram of an exemplary application scenario provided in an embodiment of the present specification;
fig. 2 is a flowchart of a test certification method provided in the first aspect of the embodiments of the present specification;
fig. 3 is a flowchart of a test certification method provided in the second aspect of the embodiments of the present specification;
fig. 4 is a block diagram of a test certification device provided in a third aspect of the embodiments of the present specification;
fig. 5 is a block diagram of a test certification device provided in a fourth aspect of the embodiments of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device provided in a fifth aspect of the embodiments of the present disclosure.
Detailed Description
Fig. 1 is a schematic diagram illustrating an application environment suitable for the test certification method provided in the embodiments of the present specification. As shown in fig. 1, the terminal device 110 establishes a communication connection with the testing device 120, the testing device 120 is connected with the target testing module 130, and the target testing module 130 is a module to be tested, such as a camera module. The terminal device 110 may be a PC computer or a mobile phone. The terminal device 110 is installed with a test client for completing a test item of the target test module, and the test client performs data interaction with the test device 120 through the terminal device 110. The test client can be test software or a test platform accessed through a browser. The test equipment 120 is an equipment for driving the target test module to execute the test item, and may also be referred to as a test box or a test tool. Taking the target test module as the camera module as an example, the test equipment may be a test box that drives image acquisition and supports electrical measurements such as open and short circuit tests, current tests, and the like. After the terminal device 110 and the test device 120 are connected, the test authentication method provided in the embodiments of the present disclosure may be executed to perform security authentication, and after the authentication is passed, the test device is started to normally operate, which is beneficial to ensuring the communication security between the terminal device 110 and the test device 120 and reducing the risk of reverse analysis and embezzlement of the core algorithm.
In order to better understand the technical solutions provided by the embodiments of the present specification, the technical solutions of the embodiments of the present specification are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present specification are detailed descriptions of the technical solutions of the embodiments of the present specification, and are not limitations on the technical solutions of the embodiments of the present specification, and the technical features in the embodiments and examples of the present specification may be combined with each other without conflict.
In a first aspect, as shown in fig. 2, an embodiment of the present specification provides a test certification method. The test authentication method executed by the test equipment in this embodiment may include the following steps S201 to S203.
Step S201, in response to an authentication instruction sent by a terminal device, sending randomly generated authentication information to the terminal device, and performing conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information.
In this embodiment, after the connection between the terminal device and the test device is established, an authentication instruction may be sent to the test device when it is detected that the test client is started. Alternatively, the authentication instruction may be sent to the test device in response to a preset trigger operation of the user. For example, an authentication button may be preset, and when the user clicks the authentication button, an operation of sending an authentication instruction to the test device is triggered; for another example, a voice password or a character string password may be set, and when the user issues a corresponding voice or inputs a corresponding character string, an operation of sending an authentication instruction to the test equipment is triggered.
In one embodiment, each testing device establishes a connection with one testing client, and the authentication command may include a pre-agreed authentication start password, such as a string password.
As another embodiment, a plurality of test clients installed on the terminal device may establish a connection with the same test device, and at this time, the authentication instruction needs to include an identity of the terminal device that sends the authentication instruction in addition to a pre-agreed authentication start password, so that the test device feeds back related information to the terminal device based on the identity.
After the test device receives the authentication instruction sent by the terminal device and verifies that the authentication start password passes, the authentication process from step S201 to step S203 is started, authentication information is randomly generated, and then the authentication information is fed back to the terminal device sending the authentication instruction, so that the terminal device executes the same conversion process as the test device based on the authentication information. In this embodiment, the authentication information may be a random number or a pseudo random number, and the specific data size may be set as needed. For example, the data size may be 32 bits, 64 bits, 128 bits, or 1 byte, etc. Of course, in other embodiments of the present invention, other data types of authentication information may be used, for example, a randomly generated character string may also be used, and is not limited herein.
It is understood that the converted first verification information is different from the authentication information originally generated by the testing device. Specifically, the process of the test device performing conversion processing on the generated authentication information based on the preset conversion rule to obtain the first verification information may include: processing the authentication information according to a preset logic operation rule to obtain a processing result; first verification information is obtained based on the processing result. The authentication information is converted according to the logic operation rule, the original authentication information can be effectively disturbed, the authentication ciphertext which is difficult to decode is obtained, and the security of the authentication process is improved.
In this embodiment, there may be a plurality of embodiments for processing the authentication information according to the preset logic operation rule, and two embodiments are mainly described below, and in the specific implementation process, other embodiments may also be adopted, which is not limited herein.
Firstly, dividing authentication information into four pieces of sub information; performing exclusive-or operation on two pieces of sub information to obtain first intermediate data, and performing exclusive-or operation on the other two pieces of sub information to obtain second intermediate data; and splicing the first intermediate data and the second intermediate data to obtain a processing result. Specifically, the information division mode may be an equal division mode, or a division mode with two consistent sizes, and the like, which is not limited herein; the data splicing manner may adopt a head-to-tail splicing manner, that is, a manner of splicing one of the intermediate data to the beginning or the end of the other intermediate data, or may also adopt an insertion manner, that is, one of the intermediate data is inserted between two preset adjacent bits of the other intermediate data, for example, both the two intermediate data are 8 bits, and one of the intermediate data may be inserted between the 2 nd bit and the 3 rd bit of the other intermediate data, which is not limited herein.
For example, the authentication information is a random number of 32 bits, the random number may be divided into 4 pieces of information, which are respectively labeled as D1, D2, D3, and D4, the first intermediate data D5 is obtained by performing an exclusive-or operation on D1 and D3, the second intermediate data D6 is obtained by performing an exclusive-or operation on D2 and D4, and then the processing results key1 are obtained by splicing D5 and D6.
Second, the authentication information may be reordered. For example, the authentication information may be shifted left, right, or two or more data thereof may be exchanged according to a specific reordering rule, which may be preset. For example, the authentication information may be a 32-bit random number, and the 0 th bit to the 30 th bit may be sequentially shifted higher by one bit, and the 31 st bit may be shifted to the 0 th bit, or the 1 st bit and the 30 th bit may be exchanged, and the 2 nd bit and the 29 th bit may be exchanged.
In an optional implementation manner, the obtaining of the first verification information based on the processing result may include: and encrypting the processing result based on the preset secret key to obtain first verification information. The secret key encryption is carried out on the basis of disturbing the authentication information based on the logic operation rule, so that the authentication information can be doubly encrypted, the accuracy of an authentication result is favorably ensured, and the communication safety between the terminal equipment and the test equipment is further ensured. For example, based on the above example, the key1 needs to be further encrypted to obtain the first authentication information key 2. Of course, in other embodiments of the present invention, the processing result based on the logical operation rule may be used as the first verification information.
In the above encryption process, the key is predefined, and the encryption algorithm may have various embodiments, which is not limited herein. For example, the AES256 algorithm may be used for the encryption operation, or other encryption algorithms such as RSA encryption algorithm may be used.
In addition to the above conversion method, in another embodiment of the present invention, another authentication information conversion method may be adopted, for example, a conversion function may be set in advance, the authentication information may be input to the conversion function, the authentication information may be converted, and the output result of the conversion function may be used as the first verification information, or the output result may be further encrypted to obtain the first verification information. Wherein, the conversion function can be set according to actual needs. For example, a translation look-up table may be provided in advance, the authentication information may be translated by looking up the table, and the translation result may be used as the first verification information, or the translation result may be further encrypted to obtain the first verification information.
Step S202, second verification information fed back by the terminal equipment is received, wherein the second verification information is obtained by the terminal equipment through carrying out preset conversion processing on the received authentication information, and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
After receiving the authentication information sent by the test equipment, the terminal equipment also performs preset conversion processing on the received authentication information to obtain second verification information, and sends the second verification information to the test equipment, so that the test setting executes the following step S203 to verify the second verification information. The second verification information is different from the authentication information originally received by the terminal device. It can be understood that the terminal device is preset with an information conversion rule, the conversion rule is the same as the conversion rule adopted by the testing device, and the conversion process executed by the testing device may be specifically referred to, and details are not repeated here.
For example, in the above example, the terminal device also divides the received 32bit random number into 4 pieces of information, which are respectively labeled as D1 ', D2', D3 'and D4', performs an exclusive-or operation on D1 'and D3' to obtain first intermediate data D5 ', performs an exclusive-or operation on D2' and D4 'to obtain second intermediate data D6', and then splices D5 'and D6' to obtain key 3. Further, the key3 is encrypted to obtain second authentication information key 4.
Step S203, whether the authentication passes is determined by comparing the first verification information with the second verification information, and if the authentication passes, the test is started.
It can be understood that, if the terminal device sending the authentication instruction is authentic, the terminal device and the testing device should adopt the identical conversion rule, and the second verification information obtained by the terminal device is identical to the first verification information obtained by the testing device; if the terminal device sending the authentication instruction is not authentic, the terminal device does not have the same conversion rule as the test device, and the second verification information obtained by the terminal device is inconsistent with the first verification information obtained by the test device. Therefore, the test device can determine whether the authentication is passed, that is, whether the terminal device is authentic, by comparing the first verification information and the second verification information, thereby determining whether to initiate the test.
Specifically, the process of determining whether to initiate the test by comparing the first authentication information and the second authentication information may include: and if the first verification information is consistent with the second verification information, judging that the authentication is passed, and starting a test process, namely starting normal work of the test equipment. For example, in one application scenario, the test device turning on normal operation includes: and initializing the system, powering on the target test module by the I/O port, responding to a test instruction sent by the terminal equipment, and executing a test item issued by the terminal equipment.
If the first verification information is inconsistent with the second verification information, the authentication is judged not to pass, and at the moment, the next authentication can be continuously waited. In a possible implementation manner, in order to further improve security, if it is detected that the terminal device does not pass N consecutive authentications, the identity of the terminal device may be added to a blacklist, at this time, when an authentication instruction sent by the terminal device is received, the identity of the terminal device may be extracted from the authentication instruction first, and whether the identity is located in the blacklist is searched for, if so, the authentication instruction is intercepted, the authentication process described in the above step S201 to step S203 is not continuously performed, and if not, the authentication process described in the above step S201 to step S203 is continuously performed. N may be set according to the requirement of the actual application scenario, and may be set to 3 times, 5 times, 10 times, or the like, for example.
In an optional implementation manner, after the test device determines the authentication result, the test device may further feed back the authentication result to the terminal device. Therefore, the user can timely know the authentication result, and subsequent processes are convenient to perform, for example, if the authentication result is that the authentication passes, the user can further send a test instruction to the test equipment to start a test item, if the authentication result is that the authentication does not pass, the user can restart the authentication, and if the authentication does not pass for multiple times, the user needs to timely search and solve the reason.
In order to more clearly illustrate the technical solution provided by this embodiment, a specific example is provided below to describe an implementation process of the test authentication method provided by this embodiment.
After a test client is started in the terminal equipment, an authentication instruction is sent to the test equipment through the terminal equipment, and after the test equipment receives the authentication instruction, a 32-bit random number is generated. On one hand, the test equipment feeds back the generated random numbers to the terminal equipment, on the other hand, the generated random numbers are divided into 4 parts which are respectively marked as D1, D2, D3 and D4, XOR operation is carried out on D1 and D3 to obtain D5, XOR operation is carried out on D2 and D4 to obtain D6, D5 and D6 are spliced to respectively obtain key1, and key1 is encrypted by adopting an AES256 algorithm according to a predefined key to obtain key 2. Correspondingly, the test device also divides the received random numbers into 4 parts, which are respectively marked as D1 ', D2', D3 'and D4', XOR-operates D1 'and D3' to obtain D5 ', XOR-operates D2' and D4 'to obtain D6', splices D5 'and D6' to respectively obtain key3, encrypts the key3 by adopting an AES256 algorithm according to a predefined key to obtain key4, and then sends the key4 to the test device. The test equipment compares the key2 with the key4, judges that the authentication passes if the keys are consistent, starts the test, judges that the authentication fails if the keys are inconsistent, and waits for the next authentication.
To sum up, in the test authentication method provided in the embodiments of the present specification, when an authentication instruction is received, randomly generated authentication information is sent to a terminal device, the authentication information is locally converted into first verification information, and the first verification information is compared with second verification information obtained by conversion by the terminal device, so as to complete security authentication, and after the authentication passes, a test is started, which is beneficial to ensuring communication security between the terminal device and the test device, and reducing risks of reverse analysis and embezzlement of a core algorithm. And the authentication process is simple and efficient, and the system overhead is reduced as much as possible while the communication safety is improved.
In a second aspect, as shown in fig. 3, an embodiment of the present specification provides a test certification method. The test authentication method executed by the terminal device in this embodiment may include the following steps S301 to S302.
Step S301, sending an authentication instruction to the test equipment, so that the test equipment randomly generates authentication information based on the authentication instruction, and performs conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information.
Step S302, receiving the authentication information sent by the test equipment, performing preset conversion processing on the received authentication information to obtain second verification information, and sending the second verification information to the test equipment, so that the test equipment determines whether the authentication passes through by comparing the first verification information with the second verification information, and if the authentication passes, starting the test.
It is understood that the conversion rule adopted by the terminal device is the same as the conversion rule adopted by the testing device, i.e. the preset conversion rule. The specific implementation process of step S301 to step S302 may refer to the related description in the method embodiment provided in the first aspect, and is not described herein again.
In the test authentication method provided by the embodiment of the specification, after the connection is established, an authentication instruction is sent to the test equipment, an authentication process is triggered, authentication information randomly generated by the test equipment is received and converted into second verification information, the second verification information is fed back to the test equipment for verification, safety authentication is realized, and after the authentication passes, the test equipment starts a test again, so that the communication safety of the terminal equipment and the test equipment is ensured, and the risk that a core algorithm is reversely analyzed and stolen is reduced. And the authentication process is simple and efficient, and the system overhead is reduced as much as possible while the communication safety is improved.
In a third aspect, please refer to fig. 4, which is a schematic structural diagram of a test authentication apparatus provided in an embodiment of the present disclosure. The apparatus provided in this embodiment may be operated in a test device, and the test certification apparatus 40 may include:
the generating and processing module 410 is configured to send randomly generated authentication information to a terminal device in response to an authentication instruction sent by the terminal device, and perform conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information;
an information receiving module 420, configured to receive second verification information fed back by the terminal device, where the second verification information is obtained by performing a preset conversion process on the received authentication information by the terminal device, and a conversion rule adopted by the terminal device is the same as the preset conversion rule;
the verification module 430 is configured to determine whether the authentication passes by comparing the first verification information with the second verification information, and if the authentication passes, start a test.
Further, the authentication information may be a random number or a pseudo random number. The generating and processing module 410 includes: the operation submodule 411 is configured to process the authentication information according to a preset logical operation rule to obtain a processing result; a determining sub-module 412, configured to obtain the first verification information based on the processing result.
Further, the determining sub-module 412 is configured to encrypt the processing result based on a preset key to obtain the first verification information.
Further, the operation sub-module 411 is configured to: dividing the authentication information into four pieces of sub information; performing exclusive-or operation on two pieces of sub information to obtain first intermediate data, and performing exclusive-or operation on the other two pieces of sub information to obtain second intermediate data; and splicing the first intermediate data and the second intermediate data to obtain the processing result.
Further, the verification module 430 is configured to determine that the authentication is passed if the first verification information is consistent with the second verification information; and if the first verification information is inconsistent with the second verification information, judging that the authentication is not passed.
The modules may be implemented by software codes, or may be implemented by hardware, for example, an integrated circuit chip.
It should be further noted that, for the specific process of implementing the respective function by each module, please refer to the specific content described in the foregoing method embodiments, which is not described herein again.
In a fourth aspect, please refer to fig. 5, which is a schematic structural diagram of a test authentication apparatus provided in the embodiments of the present disclosure. The apparatus provided in this embodiment may be operated in a terminal device, and the test certification apparatus 50 may include:
an instruction sending module 510, configured to send an authentication instruction to a test device, so that the test device randomly generates authentication information based on the authentication instruction, and performs conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information;
an information conversion module 520, configured to receive the authentication information sent by the test device, perform preset conversion processing on the received authentication information to obtain second verification information, and send the second verification information to the test device, so that the test device determines whether the authentication passes through comparing the first verification information with the second verification information, and starts a test if the authentication passes through;
and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
The modules may be implemented by software codes, or may be implemented by hardware, for example, an integrated circuit chip.
It should be further noted that, for the specific process of implementing the respective function by each module, please refer to the specific content described in the foregoing method embodiments, which is not described herein again.
In a fifth aspect, based on the same inventive concept, embodiments of the present specification further provide an electronic device. As shown in fig. 6, the electronic device includes a memory 604, one or more processors 602, and computer programs stored on the memory 604 and executable on the processors 602. When the electronic device is the testing device, the processor 602 executes the program to implement the steps of any embodiment of the test authentication method provided in the foregoing first aspect, and the specific process may refer to relevant contents of the method embodiment provided in the foregoing first aspect. When the electronic device is the terminal device, the processor 602 executes the program to implement the steps of any embodiment of the test authentication method provided in the second aspect.
Where in fig. 6 a bus architecture (represented by bus 600) is shown, bus 600 may include any number of interconnected buses and bridges, and bus 600 links together various circuits including one or more processors, represented by processor 602, and memory, represented by memory 604. The bus 600 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 605 provides an interface between the bus 600 and the receiver 601 and transmitter 603. The receiver 601 and the transmitter 603 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 602 is responsible for managing the bus 600 and general processing, and the memory 604 may be used for storing data used by the processor 602 in performing operations.
It is to be understood that the structure shown in fig. 6 is merely an illustration, and that the electronic device provided by the embodiments of the present description may further include more or fewer components than those shown in fig. 6, or have a different configuration than that shown in fig. 6. The components shown in fig. 6 may be implemented in hardware, software, or a combination thereof.
In a sixth aspect, based on the same inventive concept, embodiments of the present specification further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of any embodiment of the test authentication method provided in the first aspect, or implements the steps of any embodiment of the test authentication method provided in the second aspect.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus, and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element. The term "plurality" means more than two, including two or more.
While preferred embodiments of the present specification have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all changes and modifications that fall within the scope of the specification.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present specification without departing from the spirit and scope of the specification. Thus, if such modifications and variations of the present specification fall within the scope of the claims of the present specification and their equivalents, the specification is intended to include such modifications and variations.
Claims (10)
1. A test certification method is applied to test equipment, and the method comprises the following steps:
responding to an authentication instruction sent by terminal equipment, sending randomly generated authentication information to the terminal equipment, and carrying out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information;
receiving second verification information fed back by the terminal equipment, wherein the second verification information is obtained by the terminal equipment through carrying out preset conversion processing on the received authentication information, and a conversion rule adopted by the terminal equipment is the same as the preset conversion rule;
and determining whether the authentication passes through by comparing the first verification information with the second verification information, and starting a test if the authentication passes.
2. The method according to claim 1, wherein the authentication information is a random number or a pseudo random number, and the converting the generated authentication information based on a preset conversion rule to obtain the first verification information comprises:
processing the authentication information according to a preset logic operation rule to obtain a processing result;
and obtaining the first verification information based on the processing result.
3. The method according to claim 2, wherein the obtaining the first authentication information based on the processing result comprises:
and encrypting the processing result based on a preset key to obtain the first verification information.
4. The method according to claim 2, wherein the processing the authentication information according to a preset logic operation rule to obtain a processing result comprises:
dividing the authentication information into four pieces of sub information;
performing exclusive-or operation on two pieces of sub information to obtain first intermediate data, and performing exclusive-or operation on the other two pieces of sub information to obtain second intermediate data;
and splicing the first intermediate data and the second intermediate data to obtain the processing result.
5. The method of claim 1, wherein the determining whether the authentication is passed by comparing the first verification information and the second verification information comprises:
if the first verification information is consistent with the second verification information, judging that the authentication is passed;
and if the first verification information is inconsistent with the second verification information, judging that the authentication is not passed.
6. A test authentication method is applied to terminal equipment, and the method comprises the following steps:
sending an authentication instruction to test equipment so that the test equipment randomly generates authentication information based on the authentication instruction, and converting the generated authentication information based on a preset conversion rule to obtain first verification information;
receiving authentication information sent by the test equipment, performing preset conversion processing on the received authentication information to obtain second verification information, and sending the second verification information to the test equipment, so that the test equipment determines whether the authentication passes through the comparison between the first verification information and the second verification information, and if the authentication passes, starting the test;
and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
7. A test certification device applied to test equipment, the device comprising:
the generation and processing module is used for responding to an authentication instruction sent by the terminal equipment, sending randomly generated authentication information to the terminal equipment, and converting the generated authentication information based on a preset conversion rule to obtain first verification information;
the information receiving module is used for receiving second verification information fed back by the terminal equipment, wherein the second verification information is obtained by carrying out preset conversion processing on the received authentication information by the terminal equipment, and a conversion rule adopted by the terminal equipment is the same as the preset conversion rule;
and the verification module is used for determining whether the authentication passes through by comparing the first verification information with the second verification information, and starting a test if the authentication passes through.
8. A test authentication apparatus, applied to a terminal device, includes:
the instruction sending module is used for sending an authentication instruction to the test equipment so that the test equipment randomly generates authentication information based on the authentication instruction, and carries out conversion processing on the generated authentication information based on a preset conversion rule to obtain first verification information;
the information conversion module is used for receiving the authentication information sent by the test equipment, carrying out preset conversion processing on the received authentication information to obtain second verification information, and sending the second verification information to the test equipment, so that the test equipment determines whether the authentication passes through by comparing the first verification information with the second verification information, and if the authentication passes, starting the test;
and the conversion rule adopted by the terminal equipment is the same as the preset conversion rule.
9. An electronic device, comprising: a processor, a memory and a computer program stored on the memory, wherein the steps of the method of any of claims 1-6 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110870213.XA CN113726742B (en) | 2021-07-30 | 2021-07-30 | Test authentication method, device, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110870213.XA CN113726742B (en) | 2021-07-30 | 2021-07-30 | Test authentication method, device, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113726742A true CN113726742A (en) | 2021-11-30 |
CN113726742B CN113726742B (en) | 2023-07-21 |
Family
ID=78674382
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110870213.XA Active CN113726742B (en) | 2021-07-30 | 2021-07-30 | Test authentication method, device, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113726742B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020091932A1 (en) * | 2001-01-10 | 2002-07-11 | Ntt Advanced Technology Corporation | Qualification authentication method using variable authentication information |
US20050216737A1 (en) * | 2004-03-26 | 2005-09-29 | Sangikyo Corporation | Authentication system |
JP2006309688A (en) * | 2005-03-29 | 2006-11-09 | Toshiba Corp | Processor, memory, computer system, system lsi and authentication method |
CN101938350A (en) * | 2010-07-16 | 2011-01-05 | 黑龙江大学 | A Method of File Encryption and Decryption Based on Combined Code |
CN103076530A (en) * | 2012-12-28 | 2013-05-01 | 昆山丘钛微电子科技有限公司 | Automatic open short circuit test system for CMOS (Complementary Metal-Oxide-Semiconductor Transistor) chip and test method |
WO2015074496A1 (en) * | 2013-11-19 | 2015-05-28 | Tencent Technology (Shenzhen) Company Limited | Identity authentication method and device and storage medium |
CN106534176A (en) * | 2016-12-08 | 2017-03-22 | 西安交大捷普网络科技有限公司 | Data safety storage method in cloud environment |
CN109586846A (en) * | 2018-11-20 | 2019-04-05 | 湖南晨威高科有限公司 | Mainboard and from the communication means between plate inside a kind of direct-current charging post |
CN109670289A (en) * | 2018-11-20 | 2019-04-23 | 福建联迪商用设备有限公司 | A kind of method and system identifying background server legitimacy |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
US20200329022A1 (en) * | 2018-01-03 | 2020-10-15 | Baidu Usa Llc | Data authentication method, apparatus, and system |
WO2020235918A1 (en) * | 2019-05-21 | 2020-11-26 | Ban Young Hui | Electronic terminal device for performing log-in authentication process based on biometric information, and operation method of same |
-
2021
- 2021-07-30 CN CN202110870213.XA patent/CN113726742B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020091932A1 (en) * | 2001-01-10 | 2002-07-11 | Ntt Advanced Technology Corporation | Qualification authentication method using variable authentication information |
US20050216737A1 (en) * | 2004-03-26 | 2005-09-29 | Sangikyo Corporation | Authentication system |
JP2006309688A (en) * | 2005-03-29 | 2006-11-09 | Toshiba Corp | Processor, memory, computer system, system lsi and authentication method |
CN101938350A (en) * | 2010-07-16 | 2011-01-05 | 黑龙江大学 | A Method of File Encryption and Decryption Based on Combined Code |
CN103076530A (en) * | 2012-12-28 | 2013-05-01 | 昆山丘钛微电子科技有限公司 | Automatic open short circuit test system for CMOS (Complementary Metal-Oxide-Semiconductor Transistor) chip and test method |
WO2015074496A1 (en) * | 2013-11-19 | 2015-05-28 | Tencent Technology (Shenzhen) Company Limited | Identity authentication method and device and storage medium |
CN106534176A (en) * | 2016-12-08 | 2017-03-22 | 西安交大捷普网络科技有限公司 | Data safety storage method in cloud environment |
US20200329022A1 (en) * | 2018-01-03 | 2020-10-15 | Baidu Usa Llc | Data authentication method, apparatus, and system |
CN109586846A (en) * | 2018-11-20 | 2019-04-05 | 湖南晨威高科有限公司 | Mainboard and from the communication means between plate inside a kind of direct-current charging post |
CN109670289A (en) * | 2018-11-20 | 2019-04-23 | 福建联迪商用设备有限公司 | A kind of method and system identifying background server legitimacy |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
WO2020235918A1 (en) * | 2019-05-21 | 2020-11-26 | Ban Young Hui | Electronic terminal device for performing log-in authentication process based on biometric information, and operation method of same |
Also Published As
Publication number | Publication date |
---|---|
CN113726742B (en) | 2023-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110493197B (en) | Login processing method and related equipment | |
CN110519115B (en) | Gateway interface test method, terminal equipment, storage medium and device | |
CN101291224B (en) | Method and system for processing data in communication system | |
US11258792B2 (en) | Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium | |
CN113268715A (en) | Software encryption method, device, equipment and storage medium | |
KR101744747B1 (en) | Mobile terminal, terminal and method for authentication using security cookie | |
EP3511853B1 (en) | Security authentication method, integrated circuit and system | |
CN111131300B (en) | Communication method, terminal and server | |
CN113204772A (en) | Data processing method, device, system, terminal, server and storage medium | |
CN103795545A (en) | Safety communication method and system | |
KR20140095523A (en) | Security mechanism for external code | |
CN114329541A (en) | Data encryption method, device, device and storage medium | |
CN111510442A (en) | User verification method and device, electronic equipment and storage medium | |
CN112632573A (en) | Intelligent contract execution method, device and system, storage medium and electronic equipment | |
CN108959990A (en) | A kind of verification method and device of two dimensional code | |
CN109587180B (en) | Method for establishing connection, client and server | |
CN111988133A (en) | System SM4 encryption and decryption verification method, device, equipment and storage medium | |
CN111355683A (en) | Method, device and storage medium for ensuring http data transmission safety | |
CN113038463B (en) | Communication encryption authentication experimental device | |
CN111193730B (en) | IoT trusted scene construction method and device | |
CN114449515B (en) | Verification method, verification system, application platform and terminal | |
CN113726742B (en) | Test authentication method, device, electronic equipment and medium | |
CN118018343A (en) | Device binding method, device and storage medium | |
CN117632099A (en) | Multi-language calling method, device, equipment and medium based on application program interface | |
CN115733687A (en) | System account login control method, device, server and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |